{"id":178161,"date":"2023-12-04T07:52:52","date_gmt":"2023-12-04T15:52:52","guid":{"rendered":"https:\/\/www.mcafee.com\/blogs\/?p=178161"},"modified":"2023-12-08T15:18:02","modified_gmt":"2023-12-08T23:18:02","slug":"pdf-phishing-beyond-the-bait","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/","title":{"rendered":"PDF Phishing: Beyond the Bait"},"content":{"rendered":"<p><em><span class=\"TextRun SCXW48704058 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW48704058 BCX0\" data-ccp-parastyle=\"Subtitle\">By Lakshya Mathur &amp; Yashvi Shah<\/span><\/span><span class=\"EOP SCXW48704058 BCX0\" data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559739&quot;:160,&quot;335559740&quot;:259}\">\u00a0<\/span><\/em><\/p>\n<p>Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential theft, corporate network access, and spreading malware. This method often involves social engineering tactics, exploiting psychological factors to manipulate victims into compromising actions that can have profound consequences for personal and organizational security.<\/p>\n<p>Over the last four months, McAfee Labs has observed a rising trend in the utilization of PDF documents for conducting a succession of phishing campaigns. These PDFs were delivered as email attachments.<\/p>\n<p>Attackers favor using PDFs for phishing due to the file format&#8217;s widespread trustworthiness. PDFs, commonly seen as legitimate documents, provide a versatile platform for embedding malicious links, content, or exploits. By leveraging social engineering and exploiting the familiarity users have with PDF attachments, attackers increase the likelihood of successful phishing campaigns. Additionally, PDFs offer a means to bypass email filters that may focus on detecting threats in other file formats.<\/p>\n<p>The observed phishing campaigns using PDFs were diverse, abusing various brands such as Amazon and Apple. Attackers often impersonate well-known and trusted entities, increasing the chances of luring users into interacting with the malicious content. Additionally, we will delve into distinct types of URLs utilized by attackers. By understanding the themes and URL patterns, readers can enhance their awareness and better recognize potential phishing attempts.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-178162 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure1.jpg\" alt=\"\" width=\"859\" height=\"500\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure1.jpg 859w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure1-300x175.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure1-768x447.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure1-205x119.jpg 205w\" sizes=\"auto, (max-width: 859px) 100vw, 859px\" \/><\/p>\n<p style=\"text-align: center;\">\u00a0<em>Figure 1 \u2013 PDF Phishing Geo Heatmap showing McAfee customers targeted in last 1 month<\/em><\/p>\n<h2><strong>Different Themes of Phishing<\/strong><\/h2>\n<p>Attackers employ a range of corporate themes in their social engineering tactics to entice victims into clicking on phishing links. Notable brands such as Amazon, Apple, Netflix, and PayPal, among others, are often mimicked. The PDFs are carefully crafted to induce a sense of urgency in the victim&#8217;s mind, utilizing phrases like &#8220;your account needs to be updated&#8221; or &#8220;your ID has expired.&#8221; These tactics aim to manipulate individuals into taking prompt action, contributing to the success of the phishing campaigns.<\/p>\n<p>Below are some of the examples:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-178177 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure2.jpg\" alt=\"\" width=\"987\" height=\"817\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure2.jpg 987w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure2-300x248.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure2-768x636.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure2-156x129.jpg 156w\" sizes=\"auto, (max-width: 987px) 100vw, 987px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 2 \u2013 Fake Amazon PDF Phish <\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-178192 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure3.jpg\" alt=\"\" width=\"1016\" height=\"818\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure3.jpg 1016w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure3-300x242.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure3-768x618.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure3-160x129.jpg 160w\" sizes=\"auto, (max-width: 1016px) 100vw, 1016px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 3 \u2013 Fake Apple PDF Phish<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-178206 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure4.jpg\" alt=\"\" width=\"678\" height=\"815\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure4.jpg 678w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure4-250x300.jpg 250w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure4-107x129.jpg 107w\" sizes=\"auto, (max-width: 678px) 100vw, 678px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 4 \u2013 Fake Internal Revenue Service PDF Phish<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-178220 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure5.jpg\" alt=\"\" width=\"727\" height=\"704\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure5.jpg 727w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure5-300x291.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure5-133x129.jpg 133w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure5-24x24.jpg 24w\" sizes=\"auto, (max-width: 727px) 100vw, 727px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 5 \u2013 Fake Adobe PDF Phish<\/em><\/p>\n<p>Below are the stats on the volume of various themes we have seen in these phishing campaigns.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-178234 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure6.jpg\" alt=\"\" width=\"919\" height=\"489\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure6.jpg 919w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure6-300x160.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure6-768x409.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure6-205x109.jpg 205w\" sizes=\"auto, (max-width: 919px) 100vw, 919px\" \/><\/p>\n<p><em>Figure 6 \u2013 Different themed campaign stats based on McAfee customers hits in last 1 month<\/em><\/p>\n<h2><strong>Abuse of LinkedIn and Google links<\/strong><\/h2>\n<p>Cyber attackers are exploiting the popular professional networking platform LinkedIn and leveraging Google Apps Script to redirect users to phishing websites. Let us examine each method of abuse individually.<\/p>\n<p>In the case of LinkedIn, attackers are utilizing smart links to circumvent Anti-Virus and other security measures. Smart links are integral to the LinkedIn Sales Navigator service, designed for tracking and marketing business accounts.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-178248 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure7-1.jpg\" alt=\"\" width=\"1256\" height=\"650\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure7-1.jpg 1256w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure7-1-300x155.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure7-1-1024x530.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure7-1-768x397.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure7-1-205x106.jpg 205w\" sizes=\"auto, (max-width: 1256px) 100vw, 1256px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-178262 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure7-2.jpg\" alt=\"\" width=\"727\" height=\"412\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure7-2.jpg 727w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure7-2-300x170.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure7-2-205x116.jpg 205w\" sizes=\"auto, (max-width: 727px) 100vw, 727px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 7 \u2013 LinkedIn Smart link redirecting to an external website<\/em><\/p>\n<p>By employing these smart links, attackers redirect their victims to phishing pages. This strategic approach allows them to bypass traditional protection measures, as the use of LinkedIn as a referrer adds an element of legitimacy, making it more challenging for security systems to detect and block malicious activity.<\/p>\n<p>In addition to exploiting LinkedIn, attackers are leveraging the functionality of Google Apps Script to redirect users to phishing pages. Google Apps Script serves as a JavaScript-based development platform used for creating web applications and various other functionalities. Attackers embed malicious or phishing code within this platform, and when victims access the associated URLs, it triggers the display of phishing or malicious pages.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-178276 size-full\" src=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure8.jpg\" alt=\"\" width=\"1255\" height=\"736\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure8.jpg 1255w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure8-300x176.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure8-1024x601.jpg 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure8-768x450.jpg 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/Figure8-205x120.jpg 205w\" sizes=\"auto, (max-width: 1255px) 100vw, 1255px\" \/><\/p>\n<p style=\"text-align: center;\"><em>Figure 8 \u2013 Amazon fake page displayed on accessing Google script URL<\/em><\/p>\n<p>As shown in Figure 8, when victims click on the &#8220;Continue&#8221; button, they are subsequently redirected to a phishing website.<\/p>\n<h2><strong>Summary<\/strong><\/h2>\n<p>Crafting highly convincing PDFs mimicking legitimate companies has become effortlessly achievable for attackers. These meticulously engineered PDFs create a sense of urgency through skillful social engineering, prompting unsuspecting customers to click on embedded phishing links. Upon taking the bait, individuals are redirected to deceptive phishing websites, where attackers request sensitive information. This sophisticated tactic is deployed on a global scale, with these convincing PDFs distributed to thousands of customers worldwide. Specifically, we highlighted the increasing use of PDFs in phishing campaigns over the past four months, with attackers adopting diverse themes such as Amazon and Apple to exploit user trust. Notably, phishing tactics extend to popular platforms like LinkedIn, where attackers leverage smart links to redirect victims to phishing pages, evading traditional security measures. Additionally, Google Apps Script is exploited for its JavaScript-based functionality, allowing attackers to embed malicious code and direct users to deceptive websites.<\/p>\n<h2><strong>Remediation<\/strong><\/h2>\n<p>Protecting oneself from phishing requires a combination of awareness, caution, and security practices. Here are some key steps to help safeguard against phishing:<\/p>\n<ul>\n<li>Be Skeptical: Exercise caution when receiving unsolicited emails, messages, or social media requests, especially those with urgent or alarming content.<\/li>\n<li>Verify Sender Identity: Before clicking on any links or providing information, verify the legitimacy of the sender. Check email addresses, domain names, and contact details for any inconsistencies.<\/li>\n<li>Avoid Clicking on Suspicious Links: Hover over links to preview the actual URL before clicking. Be wary of shortened URLs, and if in doubt, verify the link&#8217;s authenticity directly with the sender or through official channels.<\/li>\n<li>Use Two-Factor Authentication (2FA): Enable 2FA whenever possible. This adds an extra layer of security by requiring a second form of verification, such as a code sent to your mobile device.<\/li>\n<\/ul>\n<p>McAfee provides coverage against a broad spectrum of active phishing campaigns, offering protection through features such as real-time scanning and URL filtering. While it enhances security against various phishing attempts, users must remain vigilant and adopt responsible online practices along with using McAfee.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>By Lakshya Mathur &amp; Yashvi Shah\u00a0 Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential&#8230;<\/p>\n","protected":false},"author":695,"featured_media":178312,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4136],"class_list":["post-178161","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>PDF Phishing: Beyond the Bait | McAfee Blog<\/title>\n<meta name=\"description\" content=\"By Lakshya Mathur &amp; Yashvi Shah\u00a0 Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PDF Phishing: Beyond the Bait | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"By Lakshya Mathur &amp; Yashvi Shah\u00a0 Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-04T15:52:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-12-08T23:18:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_PDF-Phishing.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"PDF Phishing: Beyond the Bait\",\"datePublished\":\"2023-12-04T15:52:52+00:00\",\"dateModified\":\"2023-12-08T23:18:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/\"},\"wordCount\":930,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_PDF-Phishing.png\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/\",\"name\":\"PDF Phishing: Beyond the Bait | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_PDF-Phishing.png\",\"datePublished\":\"2023-12-04T15:52:52+00:00\",\"dateModified\":\"2023-12-08T23:18:02+00:00\",\"description\":\"By Lakshya Mathur &amp; Yashvi Shah\u00a0 Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_PDF-Phishing.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_PDF-Phishing.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"PDF Phishing: Beyond the Bait\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PDF Phishing: Beyond the Bait | McAfee Blog","description":"By Lakshya Mathur &amp; Yashvi Shah\u00a0 Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"PDF Phishing: Beyond the Bait | McAfee Blog","og_description":"By Lakshya Mathur &amp; Yashvi Shah\u00a0 Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2023-12-04T15:52:52+00:00","article_modified_time":"2023-12-08T23:18:02+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_PDF-Phishing.png","type":"image\/png"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"PDF Phishing: Beyond the Bait","datePublished":"2023-12-04T15:52:52+00:00","dateModified":"2023-12-08T23:18:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/"},"wordCount":930,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_PDF-Phishing.png","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/","name":"PDF Phishing: Beyond the Bait | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_PDF-Phishing.png","datePublished":"2023-12-04T15:52:52+00:00","dateModified":"2023-12-08T23:18:02+00:00","description":"By Lakshya Mathur &amp; Yashvi Shah\u00a0 Phishing attackers aim to deceive individuals into revealing sensitive information for financial gain, credential","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_PDF-Phishing.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/12\/300x200_Blog_PDF-Phishing.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/pdf-phishing-beyond-the-bait\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"PDF Phishing: Beyond the Bait"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/178161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=178161"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/178161\/revisions"}],"predecessor-version":[{"id":178724,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/178161\/revisions\/178724"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/178312"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=178161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=178161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=178161"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=178161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}